1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grigory [225]
3 years ago
9

Given A=1101 and B=1001. What is the result of the boolean statement: AAND B​

Computers and Technology
1 answer:
attashe74 [19]3 years ago
5 0

Answer:

B  (1001)

Explanation:

The AND operator gets you 1's where there are 1's in both inputs. So if you would "overlay" the two binary values, only 1001 remains.

You might be interested in
The simple mixture of flour and water​
kykrilka [37]

Answer:

Batter is a simple mixture of flour and water is used to make crepes and pancakes. It is also used to coat fruit for fritters.

8 0
2 years ago
Read 2 more answers
What the five types of initiatives that are necessary when putting together and implementing an IT strategy
STatiana [176]

Answer:

Pre-implementation

Planning

Execution

Completion

Control

Explanation:

The pre-implementation stage speaks volumes on the breakdown of the implementation stages and how it is being formulated. It shows a stepwise identification of important implementation carriers and the responsibility of the IT organization. Their focus is to determine the content and human resources that are required to implement the strategy being formulated.

The purpose of the planning implementation stage is to plan and agree on specific goals by considering all stakeholders. There is also a need to set deadlines, time-to-time evaluation, and effective coordination of the stakeholders.

The execution phase enforces the implementation plan. As the name implies, it builds a comprehensive plan by focusing on the target group to maintain and ensure a structural and systematically conducted work environment.

The completion phase includes all actions necessary to bring out the results within the organizzation. Initially, there is a need to agree on the dimension of the IT strategy, the time dimension, and the detailed dimension.

The last phase which is the control deals with the logic of setting appropriate quantitative and qualitative control measures so as to allows continuous implementation control and navigation implementation control.

7 0
3 years ago
Question
polet [3.4K]

Answer:

ARP is a simple query–response packet protocol used to match workstations hardware addresses to IP addresses. In other words, ARP is the protocol used to identify nodes in a LAN. ARP is described in RFC 826

5 0
3 years ago
Write the class definition for a class named Employee. The class should include data members for an employee object%u2019s name
kykrilka [37]

Answer:

see explaination

Explanation:

#include <iostream>

#include <string>

using namespace std;

class Employee

{

string name;

int salary;

public: Employee()

{

}

Employee(string name, int salary)

{

this->name=name;

this->salary=salary;

}

void setName(string name)

{

this->name=name;

}

void setSalary(int sal)

{

this->salary=sal;

}

string getName()

{

return name;

}

int getSalary()

{

return salary;

}

void raiseSalary(int percentage)

{

if(percentage<0)

{

cout<<"Invalid percentage";

}

else

{

salary=salary+((float)percentage/100)*salary;

}

}

};

int main()

{

int percentage;

Employee e1("Satur",1000);

cout<<"Employee details are:";

cout<<e1.getName();

cout<<e1.getSalary();

cout<<"Enter the percentage raise";

cin>>percentage;

e1.raiseSalary(percentage);

cout<<"Raise in salary:";

cout<<e1.getSalary();

return 0;

}

7 0
3 years ago
What type of malicious software masquerades as legitimate software to entice the user to run it?
Vlada [557]

Answer:

Trojan horse

Explanation:

A Trojan horse is malicious software that masquerades as a legitimate computer program such as a video game, image file, utility program, or even an antivirus so as to entice the user to run it, thereby allowing an attackers (the developer of the malicious program) to gain access to the data on the computer in an illegal manner.

4 0
3 years ago
Other questions:
  • You work as the Network Administrator for Perfect solutions Inc. The company has a Linux- based Network. You are a root user on
    15·1 answer
  • Declare an array reference variable, week, and initialize it to an array containing the strings "mon", "tue", "wed", "thu", "fri
    15·1 answer
  • CAPTCHAs can be used as a form of signature to create a valid contract in e-commerce. True False
    6·2 answers
  • I NEED HELP!!!
    9·2 answers
  • Write a Bare Bones program that takes as input a value for X and places 4 times the value of X into the value of Z. The value of
    10·1 answer
  • What gaming PC should I get
    14·2 answers
  • Please help ASAP!!! :))
    9·1 answer
  • Is this statement true or false?
    5·1 answer
  • A new school is being built in the local school district.It will have three computer labs with 28 computers each. There will be
    13·1 answer
  • i was wondering if anybody would have a season 1 or 2 or 3 Fortnight account they never use and was gonna ask if i could play on
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!